In the Linux kernel, the following vulnerability has been resolved:
net: lapbether: fix issue of invalid opcode in lapbeth_open()
If lapb_register() failed when lapb device goes to up for the first time, the NAPI is not disabled. As a result, the invalid opcode issue is reported when the lapb device goes to up for the second time.
The stack info is as follows: [ 1958.311422][T11356] kernel BUG at net/core/dev.c:6442! [ 1958.312206][T11356] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1958.315979][T11356] RIP: 0010:napienable+0x16a/0x1f0 [ 1958.332310][T11356] Call Trace: [ 1958.332817][T11356] <TASK> [ 1958.336135][T11356] lapbethopen+0x18/0x90 [ 1958.337446][T11356] __dev_open+0x258/0x490 [ 1958.341672][T11356] __devchangeflags+0x4d4/0x6a0 [ 1958.345325][T11356] devchangeflags+0x93/0x160 [ 1958.346027][T11356] devinet_ioctl+0x1276/0x1bf0 [ 1958.346738][T11356] inetioctl+0x1c8/0x2d0 [ 1958.349638][T11356] sockioctl+0x5d1/0x750 [ 1958.356059][T11356] __x64sysioctl+0x3ec/0x1790 [ 1958.365594][T11356] dosyscall64+0x35/0x80 [ 1958.366239][T11356] entrySYSCALL64afterhwframe+0x46/0xb0 [ 1958.377381][T11356] </TASK>
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49859.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49859.json"
[
{
"id": "CVE-2022-49859-3acf4afe",
"digest": {
"function_hash": "6131603785799471265583979547836811200",
"length": 355.0
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3faf7e14ec0c3462c2d747fa6793b8645d1391df",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/wan/lapbether.c",
"function": "lapbeth_open"
}
},
{
"id": "CVE-2022-49859-3ed3cdc3",
"digest": {
"function_hash": "6131603785799471265583979547836811200",
"length": 355.0
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed4940050a7ce7fc2ccd51db580ef1ade64290b1",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/wan/lapbether.c",
"function": "lapbeth_open"
}
},
{
"id": "CVE-2022-49859-517c7f9b",
"digest": {
"line_hashes": [
"89742753693026712849594959396944891975",
"39146820269231426743276556960377909",
"17593180743282551125120032847564209145",
"162540136972695467417336382248755582585"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3faf7e14ec0c3462c2d747fa6793b8645d1391df",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/wan/lapbether.c"
}
},
{
"id": "CVE-2022-49859-7b6a69ab",
"digest": {
"function_hash": "6131603785799471265583979547836811200",
"length": 355.0
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4689bd3a1b23a1bd917899e63b81bca2ccdfab45",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/wan/lapbether.c",
"function": "lapbeth_open"
}
},
{
"id": "CVE-2022-49859-f0074a33",
"digest": {
"line_hashes": [
"89742753693026712849594959396944891975",
"39146820269231426743276556960377909",
"17593180743282551125120032847564209145",
"162540136972695467417336382248755582585"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed4940050a7ce7fc2ccd51db580ef1ade64290b1",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/wan/lapbether.c"
}
},
{
"id": "CVE-2022-49859-f01c8463",
"digest": {
"line_hashes": [
"89742753693026712849594959396944891975",
"39146820269231426743276556960377909",
"17593180743282551125120032847564209145",
"162540136972695467417336382248755582585"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4689bd3a1b23a1bd917899e63b81bca2ccdfab45",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/wan/lapbether.c"
}
}
]